Publication Date: 2022/01/22
Abstract: Information hiding has been on an ascent lately. New steganography strategies have evolved to make our data more secure and thereby enhance privacy. With the development of information technology, images have now become the center of network information transmission and has replaced text. But as images are now being increasingly used, there has also been an evolution in image information theft technology. To keep pace with the progressing theft technology, we must look for more efficient encryption procedures so as to further enhance our security prospects. The 4 out of 8 code image encryption techniques deploys transporter or carrier picture creation for encryption. Here the carrier image is made with the help of alphanumeric key phrase that is associated with each image. Each alphanumeric key will have its own unique 8-character bit value created by cutting edge 4 out of 8 code. This recently delivered carrier image is added with the actual image that we want to hide, to get the encoded picture. The opposite technique results the decoded picture. So as to further improve the protection from cyber assaults we even incorporate a cryptographic function which gives authenticity and security to the secret key produced which is to be given to the receiver so as to decode the encrypted image.
Keywords: Amended 4 out of 8 code, carrier image, image encryption, file management system, cipher image, cryptography
DOI: https://doi.org/10.5281/zenodo.5890463
PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22JAN312_(1).pdf
REFERENCES